# Initialize variables, if not set [ -z ${TMUX_SESSION_DIRS+x} ] && TMUX_SESSION_DIRS=( ~/.config/tmux/sessions ~/.local/share/tmux/sessions ~/.tmux/sessions) [ -z ${SETPROXY_CREDS_DIRS+x} ] && SETPROXY_CREDS_DIRS=(~/.config/proxycreds) [ -z ${KERBEROS_CONFIG_DIRS+x} ] && KERBEROS_CONFIG_DIRS=(~/.config/kinit) [ -z ${ENCFS_CONFIG_DIRS+x} ] && ENCFS_CONFIG_DIRS=(~/.config/encfs) export TMUX_SESSION_DIRS SETPROXY_CREDS_DIRS KERBEROS_CONFIG_DIRS ## this function updates in combination with PROMPT_COMMAND the shell-environment-variables in tmus-sessions, # every time prompt is called. It does it only, when called from tmux (Environment TMUX is set) function prompt_command() { # [ -z "${TMUX+x}" ] || eval "$(tmux show-environment -s)" if [ -n "${TMUX}" ]; then eval "$(tmux show-environment -s)" fi } PROMPT_COMMAND=prompt_command cpb() { scp "$1" ${SSH_CLIENT%% *}:~/Work } sudo() { local SUDO SUDO=$( if [ -e /bin/sudo ]; then echo /bin/sudo; else echo /usr/bin/sudo; fi ) $SUDO \ GIT_AUTHOR_EMAIL="$GIT_AUTHOR_EMAIL" \ GIT_AUTHOR_NAME="$GIT_AUTHOR_NAME" \ GIT_COMMITTER_EMAIL="$GIT_COMMITTER_EMAIL" \ GIT_COMMITTER_NAME="$GIT_COMMITTER_NAME" \ TMUX="$TMUX" \ SSHS="$SSHS" \ SSH_TTY="$SSH_TTY" \ SSH_AUTH_SOCK="$SSH_AUTH_SOCK" \ "$@" } create_symlinks() { #echo MYSHELLCONFIG_BASE: $MYSHELLCONFIG_BASE # MYSHELLCONFIG_BASEDIR="$1" # DIR="$(basename ${MYSHELLCONFIG_BASEDIR})" # cd "${MYSHELLCONFIG_BASEDIR}" cd ${MYSHELLCONFIG_BASE} #echo "DIR MYSHELLCONFIG_BASEDIR $DIR $MYSHELLCONFIG_BASEDIR" git config credential.helper 'cache --timeout=300' #Anlegen von Symlinks rm -rf ~/.vimrc ~/.vim ~/bashrc_add ~/.gitconfig ~/.tmux.conf ~/.tmux ln -sf "${MYSHELLCONFIG_BASE}/vimrc" ~/.vimrc ln -sf "${MYSHELLCONFIG_BASE}/vim" ~/.vim ln -sf "${MYSHELLCONFIG_BASE}/.gitconfig" ~/.gitconfig #ln -sf "${MYSHELLCONFIG_BASE}/bashrc_add" ~/bashrc_add ln -sf "${MYSHELLCONFIG_BASE}/tmux" ~/.tmux ln -sf "${MYSHELLCONFIG_BASE}/tmux/tmux.conf" ~/.tmux.conf # Configure to use githooks in .githooks, not in standardlocation .git/hooks $SGIT config core.hooksPath .githooks # remove all old symlinks in .githooks and relink files from .githooks to .git/hooks # don't know, why i do it here. TODO: Check it find .git/hooks -type l -exec rm {} \; && find .githooks -type f -exec ln -sf ../../{} .git/hooks/ \; cd ~- } setproxy () { ENTRY local CONFIG case $# in 0) logwarn "too few arguments" return ;; *) if [ -z ${SETPROXY_CREDS_DIRS+x} ] ; then logwarn "are you sure, SETPROXY_CREDS_DIRS is defined?" return 1 else CONFIG=$(find ${SETPROXY_CREDS_DIRS[*]} -mindepth 1 -name "$1.conf" -print -quit 2>/dev/null ) fi ;; esac if [ -e ${CONFIG} ]; then loginfo -n "${CONFIG} existing: " source "${CONFIG}" loginfo "sourced" export PROXY_CREDS="${PROXY_USER}:${PROXY_PASS}@" else loginfo "${CONFIG} not existing" export PROXY_CREDS="" fi export {http,https,ftp}_proxy="http://${PROXY_CREDS}${PROXY_SERVER}:${PROXY_PORT}" export {HTTP,HTTPS,FTP}_PROXY="http://${PROXY_CREDS}${PROXY_SERVER}:${PROXY_PORT}" EXIT } mencfs () { ENTRY [ $# -eq 0 ] && { logwarn "too few arguments" >&2; return 1; } local PKEY local ENCDIR local DESTDIR local PASS=$(which pass 2>/dev/null || exit 127 ) local ENCFS=$(which encfs 2>/dev/null || exit 127 ) local CONFIG if [ -z ${ENCFS_CONFIG_DIRS+x} ] ; then logwarn "are you sure, ENCFS_CONFIG_DIRS is defined?" EXIT return 1 else CONFIG=$(find ${ENCFS_CONFIG_DIRS[*]} -mindepth 1 -name "$1.conf" -print -quit 2>/dev/null ) fi if [ -e ${CONFIG} ]; then loginfo -n "${CONFIG} existing: " source "${CONFIG}" loginfo "sourced" else loginfo "${CONFIG} not existing" EXIT return 2 fi [ -z ${PKEY+x} ] && { EXIT; return 3; } [ -z ${ENCDIR+x} ] && { EXIT; return 4; } [ -z ${DESTDIR+x} ] && DESTDIR="$(dirname $ENCDIR)/$(basename $ENCDIR| tr '[:lower:]' '[:upper:]'| sed -e 's/^\.//')" $PASS "${PKEY}" 1>/dev/null 2>&1 || { logerror "entry $PKEY does not exist in passwordsotre"; return 5; } local ENCFS_PASSWORD=$($PASS "${PKEY}" | head -n1) if [ -z ${ENCDIR+x} -a -d ${ENCDIR} ];then logerror "no encrypted directory found -> exit" EXIT return 4 else loginfo "mount encrypted directory $ENCDIR on $DESTDIR" $ENCFS -S $ENCDIR $DESTDIR </dev/null || exit 127 ) local i [ -z ${FUSERMOUNT+x} ] && return 127 if [ $# -eq 1 ]; then if [ ! -d ${1} ];then logwarn "encrypted directory ${1} not found -> exit" >&2 EXIT return 128 else loginfo "umount encrypted directory" $1 >&2 sync $FUSERMOUNT -u "$1" fi else loginfo "no arguments given. Umount all mounted encfs-dirs" >&2 for i in $(mount|grep encfs|sed -e 's/^encfs on \(.*\)\ type.*$/\1/');do loginfo "$FUSERMOUNT -u $i" sync $FUSERMOUNT -u "$i" done EXIT return 1 fi EXIT } kinit-custom () { ENTRY local PKEY local REALM local PASS=$(which pass 2>/dev/null || exit 127 ) local KINIT=$(which kinit 2>/dev/null || exit 127 ) local CONFIG if [ -z ${KERBEROS_CONFIG_DIRS+x} ] ; then logwarn "are you sure, KERBEROS_CONFIG_DIRS is defined?" EXIT return 1 else CONFIG=$(find ${KERBEROS_CONFIG_DIRS[*]} -mindepth 1 -name "$1.conf" -print -quit 2>/dev/null ) fi if [ -e ${CONFIG} ]; then logdebug -n "${CONFIG} existing: " source "${CONFIG}" logdebug "sourced" else logwarn "${CONFIG} not existing" EXIT return 2 fi [ -z ${PKEY+x} ] && return 3 $PASS "${PKEY}" 1>/dev/null 2>&1 || return 3 local KERBEROS_PASSWORD=$($PASS "${PKEY}" | head -n1) local KERBEROS_USER=$($PASS "${PKEY}" | grep login | sed -e 's/^login: //' ) #echo KERBEROS_PASSWORD: $KERBEROS_PASSWORD loginfo "Get kerberos-ticket for: $KERBEROS_USER@$REALM" if [ -z ${KERBEROS_USER+x} ];then logwarn "no kerberos user found -> exit" EXIT return 4 else $KINIT -R "${KERBEROS_USER}@${REALM}" < ~/bashrc_add" < "${MYSHELLCONFIG_BASE}/bashrc_add" local CMD="$SSH -T $@" fi $CMD /bin/bash << EOF [ -e /etc/bashrc ] && . /etc/bashrc [ -e /etc/bash.bashrc ] && . /etc/bash.bashrc loginfo "modify ~/.bashrc" sed -i -e '/^\[ -f bashrc_add \] /d' ~/.bashrc sed -i -e '/#MYSHELLCONFIG-start/,/#MYSHELLCONFIG-end/d' ~/.bashrc echo printf "%s\n" "#MYSHELLCONFIG-start" "[ -f \"\${HOME}/${MYSHELLCONFIG_SUBPATH}/bashrc_add\" ] && . \"\${HOME}/${MYSHELLCONFIG_SUBPATH}/bashrc_add\"" "#MYSHELLCONFIG-end"| tee -a ~/.bashrc #printf "%s\n" "#MYSHELLCONFIG-start" "if [ -e \${HOME}/${MYSHELLCONFIG_SUBPATH}/bashrc_add ]; then" " . \${HOME}/${MYSHELLCONFIG_SUBPATH}/bashrc_add;" "else" " if [ -f ~/bashrc_add ] ;then" " . ~/bashrc_add;" " fi;" "fi" "#MYSHELLCONFIG-end" |tee -a ~/.bashrc echo loginfo cleanup from old config rm -rf ~/server-config && echo rm -rf ~/server-config EOF EXIT } sshs() { ENTRY # MKTMPCMD='mktemp $(echo ${XDG_RUNTIME_DIR}/bashrc.XXXXXXXX.conf)' # VIMMKTMPCMD="mktemp ${XDG_RUNTIME_DIR}/vimrc.XXXXXXXX.conf" local f local TMPBASHCONFIG=$(mktemp -p ${XDG_RUNTIME_DIR} -t bashrc.XXXXXXXX --suffix=.conf) local FILELIST=( "${MYSHELLCONFIG_BASE}/functions.sh" "${MYSHELLCONFIG_BASE}/logging" "${MYSHELLCONFIG_BASE}/myshell_load_fortmpconfig" $(getbashrcfile) ~/.aliases "${MYSHELLCONFIG_BASE}/aliases" "${MYSHELLCONFIG_BASE}/PS1" "${MYSHELLCONFIG_BASE}/bash_completion.d/*" ) local SSH_OPTS="-o VisualHostKey=no -o ControlMaster=auto -o ControlPersist=15s -o ControlPath=~/.ssh/ssh-%r@%h:%p" # Read /etc/bashrc or /etc/bash.bashrc (depending on distribution) and /etc/profile.d/*.sh first cat << EOF >> "${TMPBASHCONFIG}" [ -e /etc/bashrc ] && BASHRC=/etc/bashrc [ -e /etc/bash.bashrc ] && BASHRC=/etc/bash.bashrc . \$BASHRC export USERNAME="${USERNAME}" export FULLNAME="${FULLNAME}" export USEREMAIL="${USEREMAIL}" export SCRIPT_LOG="\$(cat /proc/\$$/cmdline | xargs -0 echo|awk '{print \$3}' |sed 's/.conf$/.log/')" export LOGLEVEL_DEFAULT="INFO" export FILELOGLEVEL_DEFAULT="INFO" for i in /etc/profile.d/*.sh; do if [ -r "$i" ];then if [ "$PS1" ]; then . "$i" else . "$i" >/dev/null fi fi done unset i EOF for f in ${FILELIST[*]}; do if [ -e $f ]; then #echo add $f to tmpconfig cat "$f" >> "${TMPBASHCONFIG}"; fi done if [ $# -ge 1 ]; then if [ -e "${TMPBASHCONFIG}" ] ; then local RCMD="/bin/bash --noprofile --norc -c " local REMOTETMPBASHCONFIG=$(ssh -T ${SSH_OPTS} $@ "mktemp -p \${XDG_RUNTIME_DIR} -t bashrc.XXXXXXXX --suffix=.conf"| tr -d '[:space:]' ) local REMOTETMPVIMCONFIG=$(ssh -T ${SSH_OPTS} $@ "mktemp -p \${XDG_RUNTIME_DIR} -t vimrc.XXXXXXXX --suffix=.conf"| tr -d '[:space:]') # Add additional aliases to bashrc for remote-machine cat << EOF >> "${TMPBASHCONFIG}" alias vi='vim -u ${REMOTETMPVIMCONFIG}' alias vim='vim -u ${REMOTETMPVIMCONFIG}' alias vimdiff='vimdiff -u ${REMOTETMPVIMCONFIG}' export LS_OPTIONS="${LS_OPTIONS}" export VIMRC="${REMOTETMPVIMCONFIG}" export BASHRC="${REMOTETMPBASHCONFIG}" title "\$USER@\$HOSTNAME: \$PWD" loginfo "This bash runs with temporary config from \$BASHRC" EOF ssh -T ${SSH_OPTS} $@ "cat > ${REMOTETMPBASHCONFIG}" < "${TMPBASHCONFIG}" ssh -T ${SSH_OPTS} $@ "cat > ${REMOTETMPVIMCONFIG}" < "${MYSHELLCONFIG_BASE}/vimrc" RCMD=" trap \"rm -f ${REMOTETMPBASHCONFIG} ${REMOTETMPVIMCONFIG}\" EXIT " ; ssh -t ${SSH_OPTS} $@ "$RCMD; SSHS=true bash -c \"function bash () { /bin/bash --rcfile ${REMOTETMPBASHCONFIG} -i ; } ; export -f bash; exec bash --rcfile ${REMOTETMPBASHCONFIG}\"" rm "${TMPBASHCONFIG}" else loginfo "${TMPBASHCONFIG} does not exist. Use »ssh $@«" >&2 ssh -t "$@" fi else logwarn "too few arguments for sshs" >&2 ssh fi EXIT } VIMRC="${MYSHELLCONFIG_BASE}/vimrc" svi () { ENTRY if [ -f ${VIMRC} ]; then sudo vim -u "${VIMRC}" $@; else sudo vim $@ fi EXIT } vim-plugins-update () { ENTRY vim -c "PluginUpdate" -c ":qa!" EXIT } vim-plugins-install () { ENTRY vim -c "PluginInstall" -c ":qa!" EXIT } vim-repair-vundle () { ENTRY if [ -z ${MYSHELLCONFIG_BASE+x} ]; then echo "MYSHELLCONFIG_BASE nicht gesetzt. Eventuell noch einmal ausloggen und wieder einloggen" else cd $MYSHELLCONFIG_BASE cd vim/bundle rm -rf Vundle.vim git clone "${MYSHELLCONFIG_GIT_REMOTE_PUBLIC}Vim/gmarik/Vundle.vim.git" cd ~- fi EXIT } getbashrcfile () { ENTRY if [ -z ${BASHRC+x} ] ; then echo "bash uses default" >&2 else cat /proc/$$/cmdline | xargs -0 echo|awk '{print $3}' fi EXIT } catbashrcfile () { ENTRY if [ -z ${BASHRC+x} ] ; then echo "bash uses default" >&2 else #cat $(cat /proc/$$/cmdline | xargs -0 echo|awk '{print $3}') cat $(getbashrcfile) fi EXIT } getvimrcfile () { ENTRY if [ -z ${VIMRC+x} ] ; then echo "vim uses default" >&2 else echo $VIMRC fi EXIT } catvimrcfile () { ENTRY if [ -z ${VIMRC+x} ] ; then echo "vim uses default" >&2 else #cat $VIMRC cat $(getvimrcfile) fi EXIT } # Functions to set the correct title of the terminal function title() { ENTRY # change the title of the current window or tab echo -ne "\033]0;$*\007" EXIT } function sshx() { /usr/bin/ssh "$@" # revert the window title after the ssh command title $USER@$HOST } function su() { /bin/su "$@" # revert the window title after the su command title $USER@$HOST } function usage() { cat << EOF Keyboard-shortcuts: # tmux: C+Cursor tmux window change size M+[hjkl] tmux change splitted windows # vim: C+[hjkl] vim change splitted windows EOF } function pdsh-update-hetzner() { curl -s -H "Authorization: Bearer $(pass hetzner.com/api-token | head -n1)" \ https://api.hetzner.cloud/v1/servers \ | /usr/bin/jq '.servers[].public_net.ipv4.ip'|sed -e 's/\"//g' \ |while read i; do dig -x $i | awk '$0 !~ /^;/ && $4 == "PTR" {print $5}' done |sed -s -e 's/\.$//' > ~/.dsh/group/hetzner-servers } function tmuxx() { ENTRY case $# in 1) SESS=($(find ${TMUX_SESSION_DIRS[*]} -mindepth 1 -name "$1.session" 2>/dev/null )) ;; *) logwarn no session specified return ;; esac TMUX_BIN='/usr/bin/tmux' $TMUX_BIN -f ~/.tmux.conf new-session -d [ -e ${SESS[0]} ] && $TMUX_BIN source-file ${SESS[0]} $TMUX_BIN attach-session -d EXIT } function checkbkp() { ENTRY if ping -c 3 backup.vpn >/dev/null 2>&1 ; then local SSH="/usr/bin/ssh" local CMD="$SSH -T backup.vpn" $CMD /bin/bash << EOF sudo find /srv/nfs/backup -mindepth 1 -maxdepth 1|grep -v -e "git$\|git-backup-repos"|while read i;do printf "%-30s%s\\n" "\$i" \$(ls \$i|tail -n1);done|sort -k 2.1 -r EOF else echo "backup.vpn is not reachable -> exit" return 1 fi EXIT } function checkbkp-full() { ENTRY if ping -c 3 backup.vpn >/dev/null 2>&1 ; then local SSH="/usr/bin/ssh" local CMD="$SSH -T backup.vpn" $CMD /bin/bash << EOF sudo find /srv/nfs/backup -mindepth 1 -maxdepth 1|grep -v -e "git$\|git-backup-repos"|while read i;do printf "%-30s%s\\n" "\$i" \$(ls \$i|tail -n1);done|sort -k 2.1 -r EOF #which pdsh 1>/dev/null 2>&1 && pdsh -g hetzner-servers sudo systemctl status backup.service which pdsh 1>/dev/null 2>&1 && pdsh -g vpn sudo systemctl status backup.service else logwarn "backup.vpn is not reachable -> exit" return 1 fi EXIT } turnoffbeep() { ENTRY changebeep none EXIT } changebeep() { ENTRY local style case $1 in none) style=none ;; visible) style=visible ;; audible) style=audible ;; *) logwarn "usage: changebeep [none|visible|audible]" EXIT return 1 ;; esac local line='set bell-style' local file=~/.inputrc if [ -e "${file}" ] ; then sed -i -e "/$line/d" "${file}" fi echo "${line} ${style}" >> "${file}" return 0 EXIT } turnoffconfigsync() { ENTRY local line='MYSHELLCONFIG_GIT_SYNC=' local file=~/.bashrc if [ -e "${file}" ] ; then sed -i -e "/${line}/d" "${file}" fi sed -i -e "/#MYSHELLCONFIG-start/i${line}false" "${file}" EXIT } turnonconfigsync() { ENTRY local line='MYSHELLCONFIG_GIT_SYNC=' local file=~/.bashrc if [ -e "${file}" ] ; then sed -i -e "/${line}/d" "${file}" fi sed -i "/#MYSHELLCONFIG-start/i${line}true" "${file}" EXIT } function gnome-shell-extensions-enable-defaults() { ENTRY local i if [ -f ~/.config/gnome-shell-extensions-default.list ]; then for i in $(cat ~/.config/gnome-shell-extensions-default.list); do #gnome-shell-extension-tool -e $i; gnome-extensions enable $i; done; fi EXIT } gnome-shell-extensions-make-actual-permanent-systemwide() { ENTRY # https://people.gnome.org/~pmkovar/system-admin-guide/extensions-enable.html # https://askubuntu.com/questions/359958/extensions-are-turned-off-after-reboot local file="/etc/dconf/profile/user" sudo mkdir -p "/etc/dconf/profile/" local line='user-db:user' if [ -e "${file}" ] ; then logtrace "$command" sudo sh -c "$command" fi local line='system-db:local' if [ -e "${file}" ] ; then command="grep -xqF -- ${line} ${file} || echo $line >> $file" sudo sh -c "$command" fi local line='enabled-extensions=' local file='/etc/dconf/db/local.d/00-extensions' sudo mkdir -p '/etc/dconf/db/local.d' if [ -e "${file}" ] ; then sudo sed -i -e "/${line}/d" "${file}" #sudo sed -i -e "/\[org\/gnome\/shell\]/d" "${file}" fi local EXTENSIONS=$(gsettings get org.gnome.shell enabled-extensions) line="[org/gnome/shell]" command="grep -xqF -- ${line} ${file} || echo $line >> $file" sudo sh -c "$command" local line='enabled-extensions=' loginfo "Update or add extensions" #echo "${line}${EXTENSIONS}" | sudo tee -a "${file}" sudo sed -i "/\[org\/gnome\/shell\]/a${line}${EXTENSIONS}" "${file}" sudo dconf update EXIT } reachable-default () { local SERVER=$1 local PORT=${2:-22} local res=3 if nc -z $SERVER $PORT 2>/dev/null; then res=0 fi return $res } reachable () { ENTRY # returncodes: # 1: servername not resolveable # 3: server:port not reachable # 999999: something went wrong # 0: server was resolve- and reachable GETENTHOSTS=ahosts # echo $@ # while getopts ":i:" arg; do # echo arg $arg # case $arg in # i) # Specify p value. # echo OPTARG: ${OPTARG} # case ${OPTARG} in # 4) # GETENTHOSTS=ahostsv4 # ;; # 6) # Specify strength, either 45 or 90. # GETENTHOSTS=ahostsv6 # ;; # esac # ;; # *) # break # ;; # esac # done # # echo $@ local SERVER=$1 # dig does not consult /etc/hosts, so use getent hosts instead #local IP=$(dig +nocmd $SERVER a +noall +answer|tail -n 1 |awk '{print $5}') # getent ahostsv4 returns only ipv4 addresses loginfo -n "Try to resolve $SERVER: " local IP=$(getent $GETENTHOSTS $SERVER|awk '$0 ~ /STREAM/ {print $1}'|uniq|head -n1) if [ -z ${IP-x} ]; then logwarn "not resolvable -> exit" return 1 else logwarn $IP fi local PORT=${2:-22} local SEC=${3:-1} local res=999 local i loginfo -n "Try to connect to ${SERVER} (${IP}):${PORT} " >&2 for i in $(seq 1 $SEC); do loginfo -n "." >&2 if reachable-default ${IP} ${PORT} 2>/dev/null; then res=0 break else res=$? fi [ ${SEC} -gt 1 -a $i -lt ${SEC} ] && sleep 1 done [ ${res} -gt 0 ] && loginfo -n " not reachable" >&2 || loginfo -n " success" >&2; EXIT return $res } utoken () { ENTRY ssh_identity=$1 [ -z "${PKCS11_MODULE+x}" ] && { PKCS11_MODULE=/usr/lib64/p11-kit-proxy.so; export PKCS11_MODULE; } if [ -n "${ssh_identity+x}" ]; then agentfile="${HOME}/.ssh/agents/agent-${ssh_identity}-$(hostname)" if [ -e "$agentfile" ]; then local SSH_AUTH_SOCK local SSH_AGENT_PID /bin/sh -c ". $agentfile >/dev/null 2>/dev/null; ssh-add -l; ssh-add -e $PKCS11_MODULE; ssh-add -l" fi fi EXIT } token(){ # Usage: # token will load token in agent. does nothing, if token is already loaded # token -r|-f|--reload-token will remove token from agent and add it again (if plugged off and plugged in again startagent -t $1 $2 } tokenold () { ENTRY [ -z "${PKCS11_MODULE+x}" ] && { PKCS11_MODULE=/usr/lib64/p11-kit-proxy.so; export PKCS11_MODULE; } [ -z "${SSH_ADD_OPTIONS+x}" ] && { SSH_ADD_OPTIONS=${SSH_ADD_DEFAULT_OPTIONS}; export SSH_ADD_OPTIONS; } [ -z "${SSH_IDENTITIES_DIR+x}" ] && { SSH_IDENTITIES_DIR=${SSH_IDENTITIES_DEFAULT_DIR-${HOME}/.ssh/identities}; export SSH_IDENTITIES_DIR; } local FORCE local ssh_identity local fingerprints declare -a fingerprints local tokenfingerprint local agentfile local FORCE=false case $1 in -f) FORCE=true ssh_identity=${2-default} ;; *) ssh_identity=${1-default} ;; esac if [ -n "${ssh_identity+x}" ]; then identitydir=${SSH_IDENTITIES_DIR}/${ssh_identity} [ -e "${identitydir}/config" ] && logdebug "found ${identitydir}/config" [ -e "${identitydir}/config" ] && eval $(<"${identitydir}/config") loginfo "SSH_ADD_OPTIONS: $SSH_ADD_OPTIONS" agentfile="${SSH_AGENTS_DIR}/agent-${ssh_identity}-$(hostname)" agentsocket="${SSH_AGENT_SOCKETS_DIR}/socket-${ssh_identity}-$(hostname)" loginfo "ssh-identität: $ssh_identity" >&2 loginfo "SSH_ADD_OPTIONS: $SSH_ADD_OPTIONS" logdebug "agentfile: $agentfile" >&2 logdebug "agentsocket: $agentsocket" >&2 logdebug "identitydir: $identitydir" fingerprints=( $(ssh-runinagent $agentfile "ssh-add -l|awk '{print \$2}'") ) if [ -e "$agentfile" ]; then tokenfingerprint="$(ssh-keygen -l -D $PKCS11_MODULE|tr -s ' '|awk '{print $2}')" logdebug "fingerprints ${fingerprints[*]}" if [[ ${fingerprints[*]} =~ $tokenfingerprint ]]; then logdebug "${tokenfingerprint}: loaded" if $FORCE; then logdebug "remove token and readd it again" >&2 logdebug "$(ssh-runinagent $agentfile ssh-add -e $PKCS11_MODULE)" loginfo "$(ssh-runinagent $agentfile ssh-add ${SSH_ADD_OPTIONS} -s $PKCS11_MODULE)" fi else logdebug "${tokenfingerprint}: not loaded" $FORCE && logdebug "$(ssh-runinagent $agentfile ssh-add -e $PKCS11_MODULE)" loginfo "$(ssh-runinagent $agentfile ssh-add ${SSH_ADD_OPTIONS} -s $PKCS11_MODULE)" fi EXIT return 0 fi EXIT return 1 fi EXIT return 2 } #EOF token-extract-pubkey() { if pkcs11-tool --module $PKCS11_MODULE --list-token-slots >&2 ;then ssh-keygen -i -m pkcs8 -f <(pkcs11-tool --module $PKCS11_MODULE -r --type pubkey $1 $2 |openssl rsa -pubin -inform DER ) if [ $? -gt 0 ] ; then token-list-objects fi else echo "Please insert token. Exit" return 1 fi } token-list-objects() { case $1 in --login|-l) pkcs11-tool --module $PKCS11_MODULE --login --list-objects ;; *) pkcs11-tool --module $PKCS11_MODULE --list-objects ;; esac } loadagent() { ENTRY local af af=$(startagent --create-only $1 ) loginfo "Load agent from $af" eval $(<$af) # . $af loginfo "SSH_AUTH_SOCK: $SSH_AUTH_SOCK" loginfo "SSH_AGENT_PID: $SSH_AGENT_PID" EXIT } ssh-runinagent () { ENTRY local agentfile local command local agentfile=${1} shift local sshcommand=${@} logtrace "run command »$sshcommand« in agent $agentfile" >&2 if [ -e "$agentfile" ]; then /bin/sh -c "unset SSH_AUTH_SOCK SSH_AGENT_PID; . $agentfile >/dev/null 2>/dev/null; $sshcommand" ret=$? else logwarn "agentfile not existent" >&2 ret=99 fi EXIT return $ret } setloglevel () { ENTRY local loglevels local oldloglevel=${LOGLEVEL-$LOGLEVEL_DEFAULT} declare -a loglevels loglevels=("ERROR" "WARN" "INFO" "DEBUG" "TRACE") if [[ ${loglevels[*]} =~ "$1" ]]; then export LOGLEVEL=$1 else logerror "LOGLEVEL must be one of ERROR, WARN, INFO, DEBUG or TRACE" fi logerror "change LOGLEVEL from $oldloglevel -> $LOGLEVEL" EXIT } setfileloglevel () { ENTRY local loglevels local oldloglevel=${FILELOGLEVEL-${FILELOGLEVEL_DEFAULT}} declare -a loglevels loglevels=("ERROR" "WARN" "INFO" "DEBUG" "TRACE") if [[ ${loglevels[*]} =~ "$1" ]]; then export FILELOGLEVEL=$1 else logerror "FILELOGLEVEL must be one of ERROR, WARN, INFO, DEBUG or TRACE" fi logerror "change FILELOGLEVEL from $oldloglevel -> $FILELOGLEVEL" EXIT }